Linking Literacy ...
Follow
Find tag "IT-Admin"
9.9K views | +0 today
Linking Literacy & Learning: Research, Reflection, and Practice
An exploration of the connections between research, learning theory, practice and the various constructs of literacy.
Curated by Dean J. Fusto
Your new post is loading...
Your new post is loading...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

How can WE create a BETTER internet together!? | Infographic

How can WE create a BETTER internet together!? | Infographic | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it

Learn more:


https://gustmees.wordpress.com/2015/01/06/sid2015-safer-internet-day-2015-participation/


https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/



Via Gust MEES
more...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

Phishing Deceives the Masses [Infographic]

Phishing Deceives the Masses [Infographic] | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
Phishing attacks exploit the often weakest link in cyber defense—human behavior. Bypassing our best judgment can be as simple as creating urgency with a fake bank notice, or complex as assuming the persona of a known business partner – just to steal our information. Numerous high-profile breaches such as the theft of credit card data …


Learn more:


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Phishing



Via Gust MEES
more...
Rescooped by Dean J. Fusto from Social Media and its influence
Scoop.it!

The four things small businesses must do to deny cyber criminals

The four things small businesses must do to deny cyber criminals | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
Kaspersky Lab says smaller firms are bigger targets to hackers than they believe.

Via Gust MEES
Dean J. Fusto's insight:

The same advice could apply to small non-profit schools. 

more...
Gust MEES's curator insight, March 12, 2014 8:10 AM


Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/


Gust MEES's comment, March 12, 2014 12:15 PM
Hi dean J. Fusto: I agree completely with You! Any school should get seen as an #SMB (Small & Medium Business) and therefore apply Cyber-Security at the same as SMB's ;)
Gust MEES's comment, March 12, 2014 12:15 PM
Hi dean J. Fusto: I agree completely with You! Any school should get seen as an #SMB (Small & Medium Business) and therefore apply Cyber-Security at the same as SMB's ;)
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

5 Wi-Fi security myths you must abandon now

5 Wi-Fi security myths you must abandon now | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
Save yourself and your friends from these outdated or inaccurate security techniques, and learn the current best practices.

Via Gust MEES
more...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

Need to Secure Your Internet Device? Discover the Dangers Posed to any Device

Need to Secure Your Internet Device? Discover the Dangers Posed to any Device | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
The internet threats that we face as users are found on every connected device no matter how secure your device is. Discover the dangers posed to any device.

Via Gust MEES
more...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

Stay Safe From Cyber Attacks This Holiday Season [Infographic]

Stay Safe From Cyber Attacks This Holiday Season [Infographic] | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
1.5 million people fall victim to cybercrime everyday. Learn 5 key ways to stay safe online.

Via Gust MEES
more...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

Infographic: The Many Faces of Today's Hackers | Cyber Security

Infographic: The Many Faces of Today's Hackers | Cyber Security | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
How many of these hacker personas are you dueling with in your organization?

Via Gust MEES
more...
Roger Smith's curator insight, November 16, 2014 6:39 PM

In most cases "DUELING" is not the word I would use!

decoflash industries's curator insight, November 19, 2014 7:21 PM

Top...

Dylan Gosselin's curator insight, November 25, 2014 7:13 AM

Cet article nous explique les différents types de hackers.

Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

The Internet of Things: Privacy and Security Issues

The Internet of Things: Privacy and Security Issues, Stefan Schiffner NIS expert, ENISA



http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
more...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

WHAT Is Malware? [pdf]


Via Gust MEES
more...
Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

WEB SAFETY - Are the websites you're using tracking what you type?

WEB SAFETY - Are the websites you're using tracking what you type? | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
Facebook, Twitter, Gmail or any webpage can track everything you do and could be keylogging your every pointer movement or keystroke. But it's how the internet has been since forever, though many, ...

Via Gust MEES
more...
Gust MEES's curator insight, December 22, 2013 4:49 PM

 

A MUST read!!!

 

Rescooped by Dean J. Fusto from 21st Century Learning and Teaching
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | Linking Literacy & Learning: Research, Reflection, and Practice | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on the cheap, the cost of conducting massive phishing campaigns continues to decline for cybercriminals.

Via Gust MEES
more...
Gust MEES's curator insight, December 11, 2013 11:36 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?

 

 

Gust MEES's curator insight, December 11, 2013 11:40 AM

 

It's nearly almost the same countries as on Spam and others, will THEY ever learn!?